Finals Deck Flashcards

1
Q

Encryption

A

renders message unreadable to everyone except intended recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Decryption

A

Revealing original meaning of encrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Symmetric Key Encryption

A

Same key is used to encrypt and decrypt message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Computationally Secure

A

takes too long for a hacker to crack code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hash Function

A

maps input of any size into output of fixed size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Certificate Authority

A

verifies digital signature of a trusted org.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Tapping

A

Eavesdropping on telephone lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sniffing

A

Eavesdropping on computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Radiation

A

wires give off electric signal that can be intercepted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Web Scraping

A

when computer program searches the web for info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malware

A

malicious software designed to cause damage or loss of control to a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Computer Virus

A

Subset of Malware

software that attaches to other programs in order to be executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Worm

A

Subset of Malware

similar to virus but runs on its own

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trojan Horse

A

Subset of Malware

software that appears to be benign, but actually runs malicious software in the background

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phishing

A

Subset of Malware

email or text that tricks user into giving sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Denial of Service Attack

A

Subset of Malware

overwhelm website by overloading with traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Spam

A

Subset of Malware

Junk email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Ransomware

A

Subset of Malware

software that threatens to publish files and/or prevents use of computer until ransom is paid

19
Q

Computer Security

A

Policies, Procedures, and Technical Measures, to ensure unauthorized access, theft, interruption or physical damage does not occur to information systems

20
Q

Attack Surface

A

Different places where a hacker can gain data

21
Q

Discovery Request

A

legal request for electronic documents

22
Q

Acceptable Use Policy

A

states acceptable uses and USERS of information and computers

23
Q

Data

A

Raw Facts

24
Q

Information

A

Data that is shaped into a meaningful form

25
Q

Information Technology

A

all hardware and software that firms need to achieve business objectives

26
Q

Information System

A

A set of interrelated components that collect, store, process, and distribute information

27
Q

Business Intelligence

A

IT to help users make better business decisions

28
Q

Management IS

A

IS + consideration of behavioral issues

29
Q

Business Processes

A

collection of activities required to produce a product or service

30
Q

Manufacturing and Production (BP)

A

Producing and Delivering products / services

31
Q

Sales and Marketing

A

Selling the organizations products / services

32
Q

Finance and Accounting

A

Managing the organizations financial records

33
Q

Human Resources

A

Attracting, Maintaining, and Developing orgs. labour force

34
Q

Norms

A

How you are expected to behave

35
Q

Values

A

why you behave a certain way

36
Q

responsibility

A

accepting costs duties and obligations for decisions

37
Q

accountability

A

mechanism to determine who is responsible

38
Q

liability

A

laws exist to allow individuals to recover damages from harm

39
Q

due process

A

make sure laws are justly applied, i.e. appeal

40
Q

privacy

A

right for individual to be left alone, free from surveillances

41
Q

web beacons

A

track that you viewed a certain item

42
Q

spyware

A

software that tracks ‘ gathers info without users knowledge

43
Q

NORA

A

non-obvious relationship awareness
combines data on one person from different sources to build a complete profile